A. an exploitable unpatched and unmitigated weakness in softwareB. an incompatible piece of softwareC. software that does not have the most current patch appliedD. software that was not approved for installation

A. Network-based has the ability to protect unmanaged devices and unsupported operating systems.B. There are no advantages compared to host-based antivirus.C. Host-based antivirus does not have the ability to collect newly created signatures.D. Network-based can protect against infection from malicious files at rest.

QUESTION 17Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has attempted to make a connection to the TFTP server. They are unable to backup the configuration file and Cisco IOS of the NY router to the TFTP server Which cause of this problem is true?

A. The TFTP server cannot obtain an address from a DHCP Server.B. The TFTP server has an incorrect IP address.C. The network administrator computer has an incorrect IP addressD. The TFTP server has an incorrect subnet mask.

Answer: D

QUESTION 18Which term represents a potential danger that could take advantage of a weakness in a system?

A. vulnerabilityB. riskC. threatD. exploit

Answer: A

QUESTION 19Which security principle states that more than one person is required to perform a critical task?